NIST Draft Practice Guide: Securing Electronic Health Records on Mobile Devices

Data Breach

The National Institute for Standards and Technology issued a “draft” version of a Cybersecurity Practice Guide aimed at doctors, hospitals, and other health care providers.

The 82-page Guide discusses how medical providers access patient data remotely and that “the use of mobile devices to store, access and transmit electronic health care records is outpacing the privacy and security protections on those devices.”  In short, health care is a rich target for hackers.

The Guide provides a set of standards for securely accessing patient data.  As a bit of warning, this Guide is packed with a number of tables and complex figures.

This is certainly more of an IT document than something that a doctor might pick up and read.

You can access the Guide here.

Comments are still being accepted.

Data Breach
Christopher Hopkins Discusses Cybersecurity & Technology for Lawyers At Law Firm Leaders Summit

I was invited to speak today in Tampa about cybersecurity and technology for lawyers at the Law Firm Leaders Summit conference. I presented to both “small firm” and “large firm” tracks at the seminar. We covered: Getting hacked on public wifi Phishing, Spearfishing and other hacks Ransomware U.S. Government’s “NIT” …

Data Breach
Christopher Hopkins Presents Keynote Cybersecurity Presentation at Florida Dispute Resolution Conference

Special thanks to the Florida Dispute Resolution Center and the 1,000+ attendees at this year’s ADR: Options and Opportunities (27th annual) Conference. My keynote address covered various forms of cybersecurity risks (not just for mediators) including phishing, spearfishing, WiFi Pineapple man in the middle attacks, DDOS attacks, physical attacks, and …

Data Breach
Is Your PC Keeping Your Information Private? Take This 10-Question Quiz

A law firm was behind that largest hack in history. How safe is your desktop or laptop PC? For both home and work, this article presents 10 questions in a quiz format about your security and privacy practices. The article also includes the steps how to find the answers — …